Operating and Securing a Cisco Switch

This course is included in our On-demand training solution.


To successfully manage a Cisco switch, administrators must understand how to manage the files and security of the chassis. Important files include configuration files and those used by the operating system. Knowing how to manage these files and secure the basic access to the switch is important for anyone deploying a switch. This course covers switch operation tasks such as file management as well as fundamental security setup of a switch. This course is one of a series in the Skillsoft learning path that covers the objectives for the Cisco exam Building Cisco Service Provider Next-Generation Networks Part 1 exam (640-875 SPNGN1). This exam counts toward the CCNA Service Provider certification.

Target Audience

This course is targeted at networking engineers who must interface with Cisco IOS, IOS XR and IOS XE devices. Additionally, those who have a need to understand technologies used in the service provider realm will benefit.



Expected Duration

90 min.

Course Objectives

Course Introduction

Device Configuration Files

  • describe device configuration files
  • Cisco IOS copy Command

  • use the copy command
  • Saving and Backing Up the Configuration

  • save and restore configurations on an IOS device
  • An Overview of Cisco Device Startup

  • describe major elements of Cisco device startup
  • Finding Cisco IOS Image

  • describe how a device finds the IOS
  • Initial Bootup Output from the Switch

  • describe the output from the initial bootup of a switch
  • Initial Configuration Using Setup

  • describe how to exit the setup script
  • Configuring Device Identification

  • configure the hostname for a device
  • Configuring Domain Name

  • configure the domain-name for a device
  • Configuring the Switch Management IP Address

  • configure the Switch Management IP Address
  • Configuring the Switch Default Gateway

  • configure the Switch Default Gateway
  • Password Attack Threat Mitigation

  • describe steps to mitigate password attack threats
  • Configuring Passwords and the Banner

  • configure Passwords and the MOTD banner
  • Telnet and SSH

  • contrast Telnet and SSH
  • Restricting Access to the Switched Network

  • describe the need for access control on a LAN
  • Configuring Port Security

  • configure Port Security
  • Verifying Port Security

  • verify Port Security
  • Port Security with Sticky MAC Address

  • describe Port Security with sticky learning
  • Securing Unused Ports

  • secure unused ports
  • Exercise: Managing and Securing a Cisco Switch